SlideShare a Scribd company logo
1 of 21
QUANTUM
COMPUTER IN
CRYPTOGRAPHY
AKSHAY MAHADEO SHELAKE
(T.Y.B.SC–COMP. SCI.)
Introduction
• What is Quantum Computer?
• The History of Quantum Computing
• What is Cryptography ?
• What are used todays Cryptography technology?
• Computer Security Organizations and Quantum Computing
What is Quantum Computer ?
• A quantum computer is a machine that performs calculations based
on the laws of quantum mechanics, which is the behavior of particles
at the sub-atomic level.
The History of Quantum Computing
The idea of a quantum computer began in the early 1980s and was
conceived by
• Paul Benioff
• Charles Bennett
• David Deutsch
• Richard Feynman
• Yuri Manin
classical computers VS quantum computers
The essence of the difference between
classical computers and quantum computers
is in the way information is stored and processed.
In classical computers, information is represented on macroscopic level by bits, which can take one of the two
values
0 or 1
In quantum computers, information is represented on microscopic level using qubits, (quantum bits) which can
take on any from the following uncountable many values
 | 0  + b | 1 
where , b are arbitrary complex numbers such that
|  | 2 + | b | 2 = 1.
Figure 3:Two-slit experiment
Figure 4:Two-slit experiment with an observation
Figure 1: Experiment with bullets
Figure 2: Experiments with waves
Classical Experiments VS Quantum Experiments
a,b  G , ak = b , find k
Discrete logarithms (basis of DH crypto, including ECC):
Integer Factorization (basis of RSA cryptography):
Given N=pq, find p and q.
Quantum Algorithms
Computational Complexity Comparison
(in terms of number of group multiplications for n-bit inputs)
Scaling of number field sieve
(NFS) on classical computers
and Shor’s algorithm for
factoring on a quantum
computer, using Beckman-
Chari-Devabhaktuni-Preskill
modular exponentiation with
various clock rates. Both
horizontal and vertical axes
are log scale.The horizontal
axis is the size of the number
being factored (Van Meter,
Itoh, & Ladd, 2005).
What is Cryptography ?
Transmitting information with access restricted to the intended recipient
even if the message is intercepted by others.
Cryptography is of increasing importance in our technological age using
broadcast, network communications, Internet ,e-mail, cell phones which
may transmit sensitive information related to finances, politics, business
and private confidential matters
CLASSICAL versus QUANTUM CRYPTOGRAPHY
Security of classical cryptography is based on unproven assumptions of
computational complexity (and it can be jeopardize by progress in algorithms and/or
technology).
Security of quantum cryptography is based on laws of quantum physics that allow to
build systems where undetectable eavesdropping is impossible
Since classical cryptography is volnurable to technological improvements it has to be
designed in such a way that a secret is secure with respect to future technology,
during the whole period in which the secrecy is required.
Quantum key generation, on the other hand, needs to be designed only to be secure
against technology available at the moment of key generation.
public-key Cryptography
• Encryption of data for many IT systems today relies on public-key
cryptography. The concept of public-key cryptography was introduced by
Whitfield Diffie and Martin Hellman in 1976
• This new method of encryption had two main purposes, encryption and
digital signatures. It entails that each person (or communicating system) gets
a pair of keys, one was dubbed the public key and the other was named the
private key.
• The public key is shared between the two parties and is used for identifying
the end-user while the private key remains a secret and is never transmitted.
Encrypted information is sent using the public key to identify the source but
only a receiver that possesses the private key is able to decode the message.
Unfortunately, the private key, while kept a secret from prying eyes, is linked
to the public key through a mathematical algorithm
Company's developing QKD System
• In 2002 - Swiss company called id Quantique
• In 2003 -American company called MagiQ
Technologies
Methods of Cryptography in Quantum Computer
Cryptographers are discussing alternatives to today’s methods and have agreed that
there are four major candidates that would provide immunity from a quantum computer
attack.
The four possible replacement methods include:
- error-correcting codes
- hash-functions
- lattice cryptography systems
- multivariate public-key cryptography system
Commercial
quantum key
distribution
products exist
Current State of Affairs
Current fiber-
based distance
record: 200 km
(Takesue et al)
Current State of Affairs
Demonstrated free-space link: 10 km
Current State of Affairs
CONCLUSION
Quantum cryptography ensure secure communication by providing security based
on the fundamental law of physics, intend of the current state of mathematical
algorithms or computing technology unlike classical encryption algorithm quantum
cryptography does not depend factoring large integers into primes but on the
fundamental principles of quantum physics. Quantum cryptography is more secure,
because an intruder is not able to replicate the photon to recreate the key.
Integrating QKD inTLS protocol will ensure financial transaction. Instead of using
RSA, inTLS protocol .We can use Quantum Cryptography securely exchange the
secret data and avoid an attack of intruder
References
• Ajtai, M. (1998).The shortest vector problem in L2 is NP-hard randomized reductions. 30th ACM Symposium onTheory of
Computing (pp. 10-19). NewYork: ACM.
• Bacon, D., & Leung, D. (2007, September).Toward aWorld with Quantum Computers. Communications of the ACM, 50(9), pp
55-59.
• Bernstein, D. J., Lange,T., & Peters, C. (2011). Wild McEliece. Lecture Notes in Computer Science, 6544/2011, 143-158.
• Brown, J. R., & Deutsch, D. (2000).The quest for the quantum computer. NewYork, NY:Touchstone (Simon & Schuster, Inc.).
• Deutsch, D., & Jozsa, R. (1992). Rapid Solution of Problems by Quantum Computation. Proceedings of the Royal Society of
London SeriesA - Mathematical Physical and Engineering Sciences (pp. 553-558). London: Royal Society of London.
• Diffie,W., & Hellman, M. E. (1976). New directions in cryptography. IEEETransactions on InformationTheory, 22(6), 644-654.
• Ding, J., & Schmidt, D. (2006). Multivariable public key cryptosystems. Contemporary Mathematics(419), 79-94.
• Docksai, R. (2011). Computers making the Quantum Leap. Futurist, 45(3), pp. 10-11.
• Gershenfeld, N. A., & Chuang, I. L. (1997, January 17). Bulk Spin-Resonance Quantum Computation. Science, 275(5298), 350-
356.
• Heger, M. (2009, January ). CryptographersTake On Quantum Computers. Retrieved July 24, 2011, from IEEE Spectrum:
http://spectrum.ieee.org/computing/software/cryptographers-take-on-quantum-computers
• IEEE Spectrum. (2008, November). Q&A with post-quantum computing cryptography researcher Jintai Ding. Retrieved Augu
8, 2011, from IEEE Spectrum: http://spectrum.ieee.org/computing/networks/qa-with-postquantum-computing-cryptography
researcher-jintai-ding/0
• Jones, J. (1998). Fast searches with nuclear magnetic resonance computers. Science, 280(5361), 229.
• Joye, M. (2009). Identity-based cryptography.Amsterdam: IOS Press
• Kielpinski, D., Monroe, C., &Wineland, D. J. (2002, June 13). Architecture for a large-scale ion-trap quantum computer. Nature
417(6890), 709-711.
• Kleinjung,T., Aoki, K., Franke, J., Lenstra, A. K.,Thomé, E., Bos, J.W., et al. (2010, August). Factorization of a 768-bit RSA
modulus. CRYPTO'10 Proceedings of the
• 30th annual conference on Advances in cryptology (pp. 333-350). Berlin, Heidelberg: Springer-Verlag.
• Lamport, L. (1979, October 18). Constructing digital signatures from a one-way function. InTechnical Report CSL-98. Menlo
Park, CA: SRI International.
• Merkle, R. C. (1988). A digital signature based on a convential encryption function. CRYPTO '87 A Conference on theTheory
and Applications of CryptographicTechniques on Advances in Cryptology (pp. 369-378). London, UK: Springer-Verlag.
• Moore's law. (n.d.).The American Heritage® Science Dictionary. Retrieved August 5, 2011, from Dictionary.com:
http://dictionary.reference.com/browse/moore%27s%20law
• Perlner, R. A., & Cooper, D. A. (2009). Quantum resistant public key cryptography: a survey. IDtrust '09 Proceedings of the
8th Symposium on Identity andTrust on the Internet (pp. 85-93). NewYork, NY: Association for Computing Machinery.
• Shor, P. (1997). Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum. SIAM Journal on
Computing, 26, 1484-1509.
• Simmons,A. (2009, May 19). Quantum implications for IT security. ComputerWeekly, pp. 14-15.
• Steane, A. (1996).The ion trap quantum information processor.Applied Physics B: Lasers and Optics, 64(6), 623-643.
• van Emde Boas, P. (1981). Another NP-complete problem and the complexity of computing short vectors in a lattice.
Netherlands: University of Amsterdam, Department of Mathematics.
• Van Meter, R., Itoh, K. M., & Ladd,T. D. (2005). Architecture-Dependent ExecutionTime of Shor's Algorithm. Retrieved from
EBSCOhost.
• Vandersypen, L., Steffen, M., Breyta, G.,Yannoni, C., Sherwood, M., & Chuang, I. (2001, December). Experimental realization
of Shor's quantum factoring algorithm using nuclear magnetic resonance. NATURE, 414(6866), 883-887.
• Wood, L. (2010, December 17).The clock is ticking for encryption. Retrieved August 8, 2011, from Computerworld:
http://www.computerworld.com/s/article/9201281/The_clock_is_ticking_on_encryption
References

More Related Content

What's hot

Quantum Computing: The Why and How
Quantum Computing: The Why and HowQuantum Computing: The Why and How
Quantum Computing: The Why and Howinside-BigData.com
 
Quantum computation - Introduction
Quantum computation - IntroductionQuantum computation - Introduction
Quantum computation - IntroductionAakash Martand
 
Taking Quantum Computing for a Spin: What is Imaginary and What is Real?
Taking Quantum Computing for a Spin: What is Imaginary and What is Real?Taking Quantum Computing for a Spin: What is Imaginary and What is Real?
Taking Quantum Computing for a Spin: What is Imaginary and What is Real?Mike Hogarth, MD, FACMI, FACP
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptographyMartins Okoi
 
Quantum computing
Quantum computingQuantum computing
Quantum computingSamira Riki
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptographysahilnarvekar
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentationKalluri Madhuri
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum ComputingKeshav
 
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...Professor Lili Saghafi
 
Quantum computer
Quantum computerQuantum computer
Quantum computerNikhil Eg
 

What's hot (20)

Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum Cryptography/QKD
Quantum Cryptography/QKDQuantum Cryptography/QKD
Quantum Cryptography/QKD
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Computing: The Why and How
Quantum Computing: The Why and HowQuantum Computing: The Why and How
Quantum Computing: The Why and How
 
Quantum computation - Introduction
Quantum computation - IntroductionQuantum computation - Introduction
Quantum computation - Introduction
 
Taking Quantum Computing for a Spin: What is Imaginary and What is Real?
Taking Quantum Computing for a Spin: What is Imaginary and What is Real?Taking Quantum Computing for a Spin: What is Imaginary and What is Real?
Taking Quantum Computing for a Spin: What is Imaginary and What is Real?
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentation
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Ibm quantum computing
Ibm quantum computingIbm quantum computing
Ibm quantum computing
 
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Computing.pptx
Quantum Computing.pptxQuantum Computing.pptx
Quantum Computing.pptx
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 

Viewers also liked

Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computingt0pgun
 
Presentation on quantum computers
Presentation on quantum computersPresentation on quantum computers
Presentation on quantum computersNancy Mann
 
Quantum computing - Introduction
Quantum computing - IntroductionQuantum computing - Introduction
Quantum computing - Introductionrushmila
 
Sthack 2015 - Aris "@aris_ada" Adamantiadis - DUAL_EC_DRBG : Une histoire de ...
Sthack 2015 - Aris "@aris_ada" Adamantiadis - DUAL_EC_DRBG : Une histoire de ...Sthack 2015 - Aris "@aris_ada" Adamantiadis - DUAL_EC_DRBG : Une histoire de ...
Sthack 2015 - Aris "@aris_ada" Adamantiadis - DUAL_EC_DRBG : Une histoire de ...StHack
 
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practice
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practiceSthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practice
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practiceStHack
 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography dataKarthik Mohan
 
Quantum Computers PART 1 & 2 by Prof Lili Saghafi
Quantum Computers  PART 1 & 2 by Prof Lili SaghafiQuantum Computers  PART 1 & 2 by Prof Lili Saghafi
Quantum Computers PART 1 & 2 by Prof Lili SaghafiProfessor Lili Saghafi
 
Quantum Computer: Quantum Model and Reality
Quantum Computer: Quantum Model and RealityQuantum Computer: Quantum Model and Reality
Quantum Computer: Quantum Model and RealityVasil Penchev
 
Eg 203310v010000m
Eg 203310v010000mEg 203310v010000m
Eg 203310v010000mCAA Sudan
 
Research paper of quantum computer in cryptography
Research paper of quantum computer in cryptographyResearch paper of quantum computer in cryptography
Research paper of quantum computer in cryptographyAkshay Shelake
 
Quantum Computing - Basic Concepts
Quantum Computing - Basic ConceptsQuantum Computing - Basic Concepts
Quantum Computing - Basic ConceptsSendash Pangambam
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptographynamanthakur
 
Quantum Computers New Generation of Computers PART1 by Prof Lili Saghafi
Quantum Computers New Generation of Computers PART1 by Prof Lili SaghafiQuantum Computers New Generation of Computers PART1 by Prof Lili Saghafi
Quantum Computers New Generation of Computers PART1 by Prof Lili SaghafiProfessor Lili Saghafi
 
Quantum Cryptography
Quantum  CryptographyQuantum  Cryptography
Quantum CryptographyBise Mond
 

Viewers also liked (20)

Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Presentation on quantum computers
Presentation on quantum computersPresentation on quantum computers
Presentation on quantum computers
 
Quantum computing - Introduction
Quantum computing - IntroductionQuantum computing - Introduction
Quantum computing - Introduction
 
Sthack 2015 - Aris "@aris_ada" Adamantiadis - DUAL_EC_DRBG : Une histoire de ...
Sthack 2015 - Aris "@aris_ada" Adamantiadis - DUAL_EC_DRBG : Une histoire de ...Sthack 2015 - Aris "@aris_ada" Adamantiadis - DUAL_EC_DRBG : Une histoire de ...
Sthack 2015 - Aris "@aris_ada" Adamantiadis - DUAL_EC_DRBG : Une histoire de ...
 
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practice
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practiceSthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practice
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practice
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography data
 
Quantum Computers PART 1 & 2 by Prof Lili Saghafi
Quantum Computers  PART 1 & 2 by Prof Lili SaghafiQuantum Computers  PART 1 & 2 by Prof Lili Saghafi
Quantum Computers PART 1 & 2 by Prof Lili Saghafi
 
Quantum Computer: Quantum Model and Reality
Quantum Computer: Quantum Model and RealityQuantum Computer: Quantum Model and Reality
Quantum Computer: Quantum Model and Reality
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Eg 203310v010000m
Eg 203310v010000mEg 203310v010000m
Eg 203310v010000m
 
Dna chip
Dna chipDna chip
Dna chip
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Quantum computing presentation 200115
Quantum computing presentation 200115Quantum computing presentation 200115
Quantum computing presentation 200115
 
Research paper of quantum computer in cryptography
Research paper of quantum computer in cryptographyResearch paper of quantum computer in cryptography
Research paper of quantum computer in cryptography
 
Quantum Computing - Basic Concepts
Quantum Computing - Basic ConceptsQuantum Computing - Basic Concepts
Quantum Computing - Basic Concepts
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
 
Quantum Computers New Generation of Computers PART1 by Prof Lili Saghafi
Quantum Computers New Generation of Computers PART1 by Prof Lili SaghafiQuantum Computers New Generation of Computers PART1 by Prof Lili Saghafi
Quantum Computers New Generation of Computers PART1 by Prof Lili Saghafi
 
Quantum Cryptography
Quantum  CryptographyQuantum  Cryptography
Quantum Cryptography
 

Similar to Quantum computer in cryptography

Artificial Intelligence and Quantum Cryptography
Artificial Intelligence and Quantum CryptographyArtificial Intelligence and Quantum Cryptography
Artificial Intelligence and Quantum CryptographyPetar Radanliev
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherAashirwad Kashyap
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherAashirwad Kashyap
 
Three Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyThree Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyIJMER
 
Artificial Intelligence and Quantum Cryptography
Artificial Intelligence and Quantum CryptographyArtificial Intelligence and Quantum Cryptography
Artificial Intelligence and Quantum CryptographyPetar Radanliev
 
Crypto quantum leap web
Crypto quantum leap webCrypto quantum leap web
Crypto quantum leap webFarhanAli18161
 
The Security of Practical Quantum Key Distribution
 The Security of Practical Quantum Key Distribution The Security of Practical Quantum Key Distribution
The Security of Practical Quantum Key DistributionXequeMateShannon
 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSijcsa
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implicationsInnoTech
 
Criptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresasCriptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresasSoftware Guru
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computingarchana lisbon
 
Petar Radanliev, PhD Thesis
Petar Radanliev, PhD ThesisPetar Radanliev, PhD Thesis
Petar Radanliev, PhD ThesisPetar Radanliev
 
Coco co-desing and co-verification of masked software implementations on cp us
Coco   co-desing and co-verification of masked software implementations on cp usCoco   co-desing and co-verification of masked software implementations on cp us
Coco co-desing and co-verification of masked software implementations on cp usRISC-V International
 
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGIJNSA Journal
 
Schaffner Quantum Computing and Cryptography.pptx
Schaffner Quantum Computing and Cryptography.pptxSchaffner Quantum Computing and Cryptography.pptx
Schaffner Quantum Computing and Cryptography.pptxsanta142869
 
QuantumComputersPresentation
QuantumComputersPresentationQuantumComputersPresentation
QuantumComputersPresentationVinayak Suresh
 
Running head QUANTUM COMPUTINGQUANTUM COMPUTING .docx
Running head QUANTUM COMPUTINGQUANTUM COMPUTING                .docxRunning head QUANTUM COMPUTINGQUANTUM COMPUTING                .docx
Running head QUANTUM COMPUTINGQUANTUM COMPUTING .docxcharisellington63520
 

Similar to Quantum computer in cryptography (20)

Artificial Intelligence and Quantum Cryptography
Artificial Intelligence and Quantum CryptographyArtificial Intelligence and Quantum Cryptography
Artificial Intelligence and Quantum Cryptography
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 
Three Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyThree Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum Cryptography
 
Artificial Intelligence and Quantum Cryptography
Artificial Intelligence and Quantum CryptographyArtificial Intelligence and Quantum Cryptography
Artificial Intelligence and Quantum Cryptography
 
Crypto quantum leap web
Crypto quantum leap webCrypto quantum leap web
Crypto quantum leap web
 
The Security of Practical Quantum Key Distribution
 The Security of Practical Quantum Key Distribution The Security of Practical Quantum Key Distribution
The Security of Practical Quantum Key Distribution
 
Az24339344
Az24339344Az24339344
Az24339344
 
Report.pdf
Report.pdfReport.pdf
Report.pdf
 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
 
Criptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresasCriptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresas
 
Networking
NetworkingNetworking
Networking
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
 
Petar Radanliev, PhD Thesis
Petar Radanliev, PhD ThesisPetar Radanliev, PhD Thesis
Petar Radanliev, PhD Thesis
 
Coco co-desing and co-verification of masked software implementations on cp us
Coco   co-desing and co-verification of masked software implementations on cp usCoco   co-desing and co-verification of masked software implementations on cp us
Coco co-desing and co-verification of masked software implementations on cp us
 
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
 
Schaffner Quantum Computing and Cryptography.pptx
Schaffner Quantum Computing and Cryptography.pptxSchaffner Quantum Computing and Cryptography.pptx
Schaffner Quantum Computing and Cryptography.pptx
 
QuantumComputersPresentation
QuantumComputersPresentationQuantumComputersPresentation
QuantumComputersPresentation
 
Running head QUANTUM COMPUTINGQUANTUM COMPUTING .docx
Running head QUANTUM COMPUTINGQUANTUM COMPUTING                .docxRunning head QUANTUM COMPUTINGQUANTUM COMPUTING                .docx
Running head QUANTUM COMPUTINGQUANTUM COMPUTING .docx
 

Recently uploaded

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Quantum computer in cryptography

  • 1. QUANTUM COMPUTER IN CRYPTOGRAPHY AKSHAY MAHADEO SHELAKE (T.Y.B.SC–COMP. SCI.)
  • 2. Introduction • What is Quantum Computer? • The History of Quantum Computing • What is Cryptography ? • What are used todays Cryptography technology? • Computer Security Organizations and Quantum Computing
  • 3. What is Quantum Computer ? • A quantum computer is a machine that performs calculations based on the laws of quantum mechanics, which is the behavior of particles at the sub-atomic level.
  • 4. The History of Quantum Computing The idea of a quantum computer began in the early 1980s and was conceived by • Paul Benioff • Charles Bennett • David Deutsch • Richard Feynman • Yuri Manin
  • 5.
  • 6. classical computers VS quantum computers The essence of the difference between classical computers and quantum computers is in the way information is stored and processed. In classical computers, information is represented on macroscopic level by bits, which can take one of the two values 0 or 1 In quantum computers, information is represented on microscopic level using qubits, (quantum bits) which can take on any from the following uncountable many values  | 0  + b | 1  where , b are arbitrary complex numbers such that |  | 2 + | b | 2 = 1.
  • 7. Figure 3:Two-slit experiment Figure 4:Two-slit experiment with an observation Figure 1: Experiment with bullets Figure 2: Experiments with waves Classical Experiments VS Quantum Experiments
  • 8. a,b  G , ak = b , find k Discrete logarithms (basis of DH crypto, including ECC): Integer Factorization (basis of RSA cryptography): Given N=pq, find p and q. Quantum Algorithms
  • 9. Computational Complexity Comparison (in terms of number of group multiplications for n-bit inputs)
  • 10. Scaling of number field sieve (NFS) on classical computers and Shor’s algorithm for factoring on a quantum computer, using Beckman- Chari-Devabhaktuni-Preskill modular exponentiation with various clock rates. Both horizontal and vertical axes are log scale.The horizontal axis is the size of the number being factored (Van Meter, Itoh, & Ladd, 2005).
  • 11. What is Cryptography ? Transmitting information with access restricted to the intended recipient even if the message is intercepted by others. Cryptography is of increasing importance in our technological age using broadcast, network communications, Internet ,e-mail, cell phones which may transmit sensitive information related to finances, politics, business and private confidential matters
  • 12. CLASSICAL versus QUANTUM CRYPTOGRAPHY Security of classical cryptography is based on unproven assumptions of computational complexity (and it can be jeopardize by progress in algorithms and/or technology). Security of quantum cryptography is based on laws of quantum physics that allow to build systems where undetectable eavesdropping is impossible Since classical cryptography is volnurable to technological improvements it has to be designed in such a way that a secret is secure with respect to future technology, during the whole period in which the secrecy is required. Quantum key generation, on the other hand, needs to be designed only to be secure against technology available at the moment of key generation.
  • 13. public-key Cryptography • Encryption of data for many IT systems today relies on public-key cryptography. The concept of public-key cryptography was introduced by Whitfield Diffie and Martin Hellman in 1976 • This new method of encryption had two main purposes, encryption and digital signatures. It entails that each person (or communicating system) gets a pair of keys, one was dubbed the public key and the other was named the private key. • The public key is shared between the two parties and is used for identifying the end-user while the private key remains a secret and is never transmitted. Encrypted information is sent using the public key to identify the source but only a receiver that possesses the private key is able to decode the message. Unfortunately, the private key, while kept a secret from prying eyes, is linked to the public key through a mathematical algorithm
  • 14. Company's developing QKD System • In 2002 - Swiss company called id Quantique • In 2003 -American company called MagiQ Technologies
  • 15. Methods of Cryptography in Quantum Computer Cryptographers are discussing alternatives to today’s methods and have agreed that there are four major candidates that would provide immunity from a quantum computer attack. The four possible replacement methods include: - error-correcting codes - hash-functions - lattice cryptography systems - multivariate public-key cryptography system
  • 17. Current fiber- based distance record: 200 km (Takesue et al) Current State of Affairs
  • 18. Demonstrated free-space link: 10 km Current State of Affairs
  • 19. CONCLUSION Quantum cryptography ensure secure communication by providing security based on the fundamental law of physics, intend of the current state of mathematical algorithms or computing technology unlike classical encryption algorithm quantum cryptography does not depend factoring large integers into primes but on the fundamental principles of quantum physics. Quantum cryptography is more secure, because an intruder is not able to replicate the photon to recreate the key. Integrating QKD inTLS protocol will ensure financial transaction. Instead of using RSA, inTLS protocol .We can use Quantum Cryptography securely exchange the secret data and avoid an attack of intruder
  • 20. References • Ajtai, M. (1998).The shortest vector problem in L2 is NP-hard randomized reductions. 30th ACM Symposium onTheory of Computing (pp. 10-19). NewYork: ACM. • Bacon, D., & Leung, D. (2007, September).Toward aWorld with Quantum Computers. Communications of the ACM, 50(9), pp 55-59. • Bernstein, D. J., Lange,T., & Peters, C. (2011). Wild McEliece. Lecture Notes in Computer Science, 6544/2011, 143-158. • Brown, J. R., & Deutsch, D. (2000).The quest for the quantum computer. NewYork, NY:Touchstone (Simon & Schuster, Inc.). • Deutsch, D., & Jozsa, R. (1992). Rapid Solution of Problems by Quantum Computation. Proceedings of the Royal Society of London SeriesA - Mathematical Physical and Engineering Sciences (pp. 553-558). London: Royal Society of London. • Diffie,W., & Hellman, M. E. (1976). New directions in cryptography. IEEETransactions on InformationTheory, 22(6), 644-654. • Ding, J., & Schmidt, D. (2006). Multivariable public key cryptosystems. Contemporary Mathematics(419), 79-94. • Docksai, R. (2011). Computers making the Quantum Leap. Futurist, 45(3), pp. 10-11. • Gershenfeld, N. A., & Chuang, I. L. (1997, January 17). Bulk Spin-Resonance Quantum Computation. Science, 275(5298), 350- 356. • Heger, M. (2009, January ). CryptographersTake On Quantum Computers. Retrieved July 24, 2011, from IEEE Spectrum: http://spectrum.ieee.org/computing/software/cryptographers-take-on-quantum-computers • IEEE Spectrum. (2008, November). Q&A with post-quantum computing cryptography researcher Jintai Ding. Retrieved Augu 8, 2011, from IEEE Spectrum: http://spectrum.ieee.org/computing/networks/qa-with-postquantum-computing-cryptography researcher-jintai-ding/0 • Jones, J. (1998). Fast searches with nuclear magnetic resonance computers. Science, 280(5361), 229. • Joye, M. (2009). Identity-based cryptography.Amsterdam: IOS Press • Kielpinski, D., Monroe, C., &Wineland, D. J. (2002, June 13). Architecture for a large-scale ion-trap quantum computer. Nature 417(6890), 709-711.
  • 21. • Kleinjung,T., Aoki, K., Franke, J., Lenstra, A. K.,Thomé, E., Bos, J.W., et al. (2010, August). Factorization of a 768-bit RSA modulus. CRYPTO'10 Proceedings of the • 30th annual conference on Advances in cryptology (pp. 333-350). Berlin, Heidelberg: Springer-Verlag. • Lamport, L. (1979, October 18). Constructing digital signatures from a one-way function. InTechnical Report CSL-98. Menlo Park, CA: SRI International. • Merkle, R. C. (1988). A digital signature based on a convential encryption function. CRYPTO '87 A Conference on theTheory and Applications of CryptographicTechniques on Advances in Cryptology (pp. 369-378). London, UK: Springer-Verlag. • Moore's law. (n.d.).The American Heritage® Science Dictionary. Retrieved August 5, 2011, from Dictionary.com: http://dictionary.reference.com/browse/moore%27s%20law • Perlner, R. A., & Cooper, D. A. (2009). Quantum resistant public key cryptography: a survey. IDtrust '09 Proceedings of the 8th Symposium on Identity andTrust on the Internet (pp. 85-93). NewYork, NY: Association for Computing Machinery. • Shor, P. (1997). Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum. SIAM Journal on Computing, 26, 1484-1509. • Simmons,A. (2009, May 19). Quantum implications for IT security. ComputerWeekly, pp. 14-15. • Steane, A. (1996).The ion trap quantum information processor.Applied Physics B: Lasers and Optics, 64(6), 623-643. • van Emde Boas, P. (1981). Another NP-complete problem and the complexity of computing short vectors in a lattice. Netherlands: University of Amsterdam, Department of Mathematics. • Van Meter, R., Itoh, K. M., & Ladd,T. D. (2005). Architecture-Dependent ExecutionTime of Shor's Algorithm. Retrieved from EBSCOhost. • Vandersypen, L., Steffen, M., Breyta, G.,Yannoni, C., Sherwood, M., & Chuang, I. (2001, December). Experimental realization of Shor's quantum factoring algorithm using nuclear magnetic resonance. NATURE, 414(6866), 883-887. • Wood, L. (2010, December 17).The clock is ticking for encryption. Retrieved August 8, 2011, from Computerworld: http://www.computerworld.com/s/article/9201281/The_clock_is_ticking_on_encryption References